We strive to use industry-standard practices to proactively monitor and maintain website security. These practices include a combination of technical, operational and managerial controls. Security mechanisms in place include, but are not limited to, firewalls, network monitoring and encryption to protect certain sensitive transmissions of information. No security system is fail-safe, and we cannot guarantee information will never be obtained by unauthorized persons.
Our servers collect data regarding each site visitor’s session. This information is collected so we can compile and analyze usage data to provide reports to KERA as well as further develop the site to be more useful to visitors. Site visitors are not required to submit personal information to the website(s) we host on behalf of KERA. However, if they decline to do so, we may not be able to provide site users with requested content or services. Any personal information that site visitors submit through the website is owned by KERA, and used only to provide the contracted-for services.